๐Ÿ” CVE Alert

CVE-2025-14388

CRITICAL 9.8

PhastPress <= 3.7 - Unauthenticated Arbitrary File Read via Null Byte Injection

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

The PhastPress plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read via null byte injection in all versions up to, and including, 3.7. This is due to a discrepancy between the extension validation in `getExtensionForURL()` which operates on URL-decoded paths, and `appendNormalized()` which strips everything after a null byte before constructing the filesystem path. This makes it possible for unauthenticated attackers to read arbitrary files from the webroot, including wp-config.php, by appending a double URL-encoded null byte (%2500) followed by an allowed extension (.txt) to the file path.

CWE CWE-158
Vendor kiboit
Product phastpress
Published Dec 23, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for kiboit phastpress

Be the first to know when new critical vulnerabilities affecting kiboit phastpress are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

kiboit / PhastPress
0 โ‰ค 3.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/eec9bbc0-5a68-4624-a672-bd6227d6fa45?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9641 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9608 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9570 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9597 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3418139

Credits

Angus Girvan